Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 07:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
-
Size
720KB
-
MD5
0314165d358e7ec5345000bd372d362d
-
SHA1
8d8633c6b7b73825aaa833005e0e58b5e2a5d7df
-
SHA256
f92a7ef3552964bf4ecdacec1bd1868b6ec0627ec19f12e2d8d09df51e4df972
-
SHA512
a8db9864db7fd1c826e7de606519cc6b9a233f094faec41cc3eee678b8b1f25750af425068d3b1a22279b6ef03b5348052789a8ea7c4cd93ba293faaef74a5a9
-
SSDEEP
12288:dc//////t1F8gjXVAMSe68G5IBDvu8W/SAIyUWLd370kQ7/FAgvQXCdQHG8lgSTN:dc//////tvhjNY80JvUWL1oAgpQHG8ua
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/2404-4-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-6-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-7-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-14-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-9-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-8-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\2010.txt JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1912 set thread context of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 2404 set thread context of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5CD4C61-D7CB-11EF-808B-E61828AB23DD} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443607514" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 1912 wrote to memory of 2404 1912 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 28 PID 2404 wrote to memory of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 PID 2404 wrote to memory of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 PID 2404 wrote to memory of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 PID 2404 wrote to memory of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 PID 2404 wrote to memory of 2248 2404 JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe 29 PID 2248 wrote to memory of 1788 2248 IEXPLORE.EXE 30 PID 2248 wrote to memory of 1788 2248 IEXPLORE.EXE 30 PID 2248 wrote to memory of 1788 2248 IEXPLORE.EXE 30 PID 2248 wrote to memory of 1788 2248 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633323b0276febd62eaddb61c75ef2ff
SHA16a8b666262b7d81ddc712034a3ec26c8e23a9ee4
SHA256ce515e13691bf58cc759d64a6586d3395b52d828a76d7d0f7461ca8dea7e1f3f
SHA512f167b5a3b0f70cc45ca2b5ffcb718c6e2434c4e3248ba778f2e22cd350bb3b67eda9b159e3ab1065ebe7c5d9cb4d4ea951d931db91a97c8f80ffd3050152108b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54091bcd89f5dba4b3f46945bea005783
SHA1fcbc979ea2fb434295ae1fe41ddb96e0ebef5ab8
SHA2568acb7796b6734dba45b6977ada1377b25a9174d4727d0e1e14bf371d3999a993
SHA512325d19bebb5317f6fe8a632b2f6965c714be88b237f9070cdfef36ca466782f9f671225e48dec4a26626ea8f490f75e48821dc9ba3a7d76dc4c61c8c47fb257b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bd335b25b87a4fdd5c8568bea926d4
SHA1ea4463ba9dfe0efa80fe00a254926e4423df1de6
SHA256ed67618ac6840ca452c6a72e05b49dce2a56b10efa13932d5b73f38e36a04020
SHA5122cf83b48b9fe278212505c77212dc66d1f25dd2b1dbdc72eb82cc1ab3dc45757985ca818fba5e0edfc3b3665a9f219ea1635fc16c50002f0942cf7b942020623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba3cd7ec256fe888d47f1d24169207c
SHA14e1899c5c439c39b6eca789fe1405bb46f6c41eb
SHA256283af44870dd6a0626db546c7cd3d5941d6e098bda3d76233a1285f290c23e44
SHA512646793ab613ff4b728a9376c3eb8b45737aec82fd237e137ac9dface1c2390d5f10dfd170bcde5ddb0e55cc79111b57d6fa774da9fb88103301ded1e79429d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e7c4dc8298fcce75a230cda7a8dd23
SHA1eeeb62ef6b904dd1ccd19fd457a8f525e040db5a
SHA2563dd71abf16d210580843d4c50540e59b904f53b4c3817fc41d4ddaaa287df837
SHA512032438cc4cd8760c835c3edc3fc4623fd9b2873be196ac3cb3bd623153a9ae6fddd0e7c23a74dca0b769ba1a1800c7b2422c34056cbd7251574bdc9c81eb2fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb62736ab5e7dd4641bc23a118d8b6aa
SHA1d8fc4efb7b27d50fbb899b683ef0618b7f4e1a37
SHA25605b382e9e9d610bee2837256bad4e00af9a687a7bfb8b23fe8b6899dc6def82b
SHA51262b316a54f255e1d29a93af07cb5aa0f62b73b4a8813e6bcbbea6c8e6a74c38bb7056291c6bb92b40599fe1ed334574a74b93bc71bb24f22b0f35e76e2b8485d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58492e81a13fba06e37c9251e2b32d286
SHA115ea2fc9707fff14f633db89cdfb9854425943f8
SHA2562f3b79737acb3279478136ada0065799578da27b040f5c891089553e67873023
SHA5120dcc52e997cf4fe92acf24cbd667c6794c2ea9bc53f5211e04bee9c05a5e527492ad62cad7e147accb7e192d1c725a79050a9f9604a54196e0969897923122df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cefdc8b362e21e08638bb7a67dcf94c
SHA15df1a83859b305005441c545f91505be83b0c6e6
SHA25683fda9128fbac0919e30b5b5a2a6048f068c3ed8501315db4f75e7a76c6c4e8a
SHA5123d2ac6ec08f0d71606370bf7f5d51aedcfbeba55d2735f60fb9463416a9a1ca57d80ded0c63ac43a06863b58a98155cc9c9c1d0691c81bfda433a65a3d15147c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110ac4c36d5cbe308723d81d1cf332aa
SHA1495a469723577da40ec2e1b2b4028e170ca74db9
SHA2560b447afab620fcb3b6314e1fd826d0cb3d237e9f5baf6820a5f7d4c17c50eb8c
SHA5124ea404bd280d6399b08e19d8377db603a9e6dab73d1788846b2d904b382d986c664d0d3a65413fe3ef21f7ada47c2050648ce33d40f0c3b2227b0d7ab58b3061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb523b607b34780aad04a7f7b53046f2
SHA19a14c21408cafa4f373c5196b0e98c30b6cddc10
SHA256beef01a132e092f22b052299e19c2fadaed470b071dcae133f52fb353b2ee261
SHA512eb263ef91279139d5713a099cb0b8f2928ac0a84491bfdcece0b2faec3f9e64050c49c0cdae57ec4d3db55ef0fcff0714f6c0c8b0fa5d6c1ec0a4f2d6afbf61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd68af550c72d0722071b2da38176e3
SHA1ff3d24b26936d360f6667e86c8a5469c878ddc73
SHA25611677092c29da8bf9a4b13917a13a6d513ed4a7a15b69e2c93846c97286d2ba8
SHA512005eb65877d47eb31cb7e6f9f1fef813928194f4faa5710d1502f04ff9a2a9bbd4f0a78140e3b6a24bc96cd68a076d70bddfa0289e733bebe1a49a60a835ff08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416a2159b202ae880efc59ff012cdeb1
SHA1454465513017f3c84fe2ef8f85f81a7498725358
SHA2569a1fcd3366931914446c21c51b88c9c329b6d6004e18a459f36e6b430fe831e1
SHA5126ea695dff403cf9e3708b930170e92d44295fa0c623e9099450eae392ff84af7a0d3fc99f24a6ae5c04f2ba3caccd57eefc20746babcf43c96eb3157fc297fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154babd4188d4be1771fb18eaa919b4c
SHA1985eea12d51f638d11d84b438bbcbf8e71c6eb22
SHA256256d7352ae4fa9e500ce7efc55c1be519b059c595a3fc6693086e44eb25f8ba2
SHA512fa1643152d3a9ab9c8da1907a80950e307e12cb6902ff1bc76fb76063bfe81c29282a79260f509429bed15a69b168127374af3c0913be0ca5c2b52c16b90b552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118249322c0e6e79a13a98ff31c95de9
SHA145a5553ada7a6ed4c68b836de74a377242ed95d7
SHA256b26b73ac927b38a417806a47fe73a420429a7b24a3672e0ff5bd69dbd7d5b3ab
SHA512d4fc1bac641eacf73fe44b4f5d882a726320f6655ddf439302751c4e8842bec1c39eac91c44597f898a156291b3823ac4596a4a012038320e466297895cbe477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b2b99378fc30bd42dc5e6609095153
SHA1dea3c54cb73bd115d711e180a6c65f0ab6c52317
SHA25632896d806ab9af4cc547b1bad2744eb27b8a9365b81a9e81dc641944d1a2a924
SHA51269e22cf6345c3b7962ced72679df454a9509ab82aa458c7f41d462b765d5b9cde4eaaaaffcc39b945cb1845a0db6fbb4073c433ca4eeb10dc3b6861809eb472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48fcb529249e98ef01006fd192dfbfe
SHA1cb560fff084641b3e865c0d21b373af05aec9edb
SHA2565ec4f3faa078b614173d597cd8cbd42ccf73054ac6e7b58da719dfaaac571706
SHA512b605a16fe815c6290ef77e1515c81d420d43f610d84912ebd398906a4ea83935b6bf1d669b8255d9a12a2b6220f4716e650bf617c88c3632b8688ba90760816e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080eae8784e4aa4a2c1e8fafe42d362e
SHA13d4461ca807d91ca009db1b0b9c0ce43c85602d9
SHA25600f8e2e4ba2103a0902380c8b4bf4291a0ae1cc6c1ad62d39f33b246acd16c9e
SHA51299f054a53e732c6afb98b65c56201e06ca35e4458204f4d1fe2037194b7cb21cc305a1db40c65322f5750b670d3689c64bf6d5fece2b66f9bf8f198543049834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8044dfd3ef7a0ae7e69b67b15bf9557
SHA17d1caafa897c04b2e1d83b435cd1b178559b8b5c
SHA25613ca5a3689395c94afcb429d05163f22baff8334272627acf2b6e26cb6f26184
SHA5126b0dbf5a27a2bf7d7905c876daf8b45514c60faaec85b2fdb5453ebf4ad950bd7151dce495b6b277ee661cd35fa9aa8a2eb82a391578c3b14eaf63c89ebe2f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90051be7904daef738022c7b7424770
SHA1e523c944e488949751a40804ad5fefdb0f8fe0fa
SHA2562af65245ee38d1b75661728a85b16b5b17f9d51a16e618f0e2723af5ccf8116f
SHA512be032d1017612c82edc1bd89d28d28bd5be3fb6d865f3e25fbf7df6be40b90405e56c288e7114bf24a651a41f895c416372fe550d570d0dad05f2a128dbd809e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b